Rogue Access Points and UBC s Wi-Fi Network
|
|
- Aleesha Golden
- 6 years ago
- Views:
Transcription
1 Rogue Access Points and UBC s Wi-Fi Network Arunkumar Chebium, Pawittar Dhillon, Kaveh Farshad, Farhan Masud Department of Electrical and Computer Engineering, University of British Columbia Vancouver, BC, Canada {arun.chebium, peterdhillon, kfarshad, farhanmasud}@gmail.com ABSTRACT Rogue Access Points (RAPs) constitute arguably the biggest security threat to Wireless (Wi-Fi) networks today. In this term project, we have studied RAPs in UBC s Wi-Fi network. We have mined recently collected data about wireless access points on campus to extract information about RAPs, prepared scatter plots of this data, demonstrated some threats that a malicious hacker could give rise to by means of using a RAP (MAC address spoofing, phishing, snooping), and talked to a UBC IT network analyst to understand the countermeasures UBC has in place currently to counter the threat of RAPs. Based on this work, we develop a threat model and propose some additional countermeasures that could be employed by students, campus employees and UBC IT administrators to further reduce the threat posed by these RAPs. INTRODUCTION A RAP is, quite simply, any un-trusted or unknown access point in a wireless Local Area Network (WLAN) that could be used by hackers to gain backdoor access into an otherwise secure network and conduct malicious activity such as snooping, introducing worms and viruses, and launching Man-in-the-Middle (MiM) attacks. A common approach in the industry to detect RAPs is to use sniffer software such as AirMagnet, Airdefense, and NetStumbler and perform a walking audit with a portable 1 device. These software programs can then capture the coordinates of the various Access Points (APs), their SSIDs (Service Set Identifiers), MAC addresses and signal strengths. However, this is a very timeconsuming method; moreover, it only yields a snapshot at a certain point in time [1]. A more reliable - albeit expensive - approach involves the use of permanent antennas (probes) that continuously monitor the airwaves to obtain a full wireless footprint of the network [2]. Background probing may also be implemented for organizations that have established wireless network connectivity to augment the existing infrastructure [2]. Solutions proposed by academia to address this issue are few (see [3], [4], [5] for examples of major work). Also, because of their reliance on analyzing the content of actual network traffic, they seem a bit impractical to efficiently and quickly apply to an enterprise-strength network such as UBC s. In this project, we begin by presenting data about the spread of RAPs in UBC s Wi-Fi coverage area. Then we demonstrate some threats that a hacker using a RAP can give rise to. This led us to conducting a security analysis and sketching out a threat model for the network. Then, based on an interview conducted with a UBC network analyst to understand the countermeasures currently employed by UBC to counter RAPs, we propose some additional countermeasures of our own which, in our opinion, will help further reduce the threats posed by RAPs.
2 ROGUE ACCESS POINTS IN UBC s Wi-Fi NETWORK Our first task was to identify and map out the RAPs currently active in UBC s Wi-Fi network in order to get a grasp on the magnitude of the problem. In order to do this, we began with survey data pertaining to UBC s wireless coverage collected by a team member (Peter) as part of another course (EECE 496). The survey s primary intention was to obtain an estimate of the spread of wireless access points on campus so that a plan could be developed to introduce highly portable devices such as Wi-Fi equipped tablets, PDAs and VOIP-enabled devices into the wireless network. The survey was conducted by performing various walking audits that spanned the length and breadth of the UBC campus and resulted in comprehensive data about access points legitimate and rogue in the form of huge data files. Each data file consists of over 200,000 lines of data, with each line specifying information about an access point in terms of its GPS co-ordinates, SSID, and other parameters of interest. Then, by means of a filtering program in MATLAB that we developed, we mined the data in these files and extracted information about those access points that have SSIDs other than ubc and ubcsecure (and are, therefore, unauthorized). We also used the program to prepare scatter plots of the extracted data in order to obtain visually intuitive representations. Here are some of these results: Fig 1: Area of campus that was surveyed 2 Fig 2: Map of legitimate access points across campus
3 Fig 3: Map of Rogue Access Points across campus Over 400 RAPs were found in the data that was mined to obtain RAP information. THREATS DEMONSTRATED Our second task was to demonstrate some of the threats that RAPs can give rise to. There are three threats that we demonstrated: (1) MAC Address Spoofing (2) Phishing (3) Snooping on sensitive data. (1) MAC Address Spoofing: To demonstrate this threat, we brought in a rogue desktop computer into UBC and, to allow it to log onto UBC s wired LAN, assigned it the MAC address of a trusted computer that was already authenticated and allowed to use the LAN. We then disconnected the trusted computer from the LAN and attempted to access the internet from the rogue computer instead. We were successful in our attempt. (2) Phishing: Our second mode of attack was more involved. Our intention was to set up a wireless RAP on this rogue desktop computer and broadcast our SSID so that wireless-enabled laptops in the RAP s vicinity would automatically connect to our RAP instead of to UBC s regular wireless service (see [6] for an explanation of why laptops should automatically connect to our RAP). For this purpose, we purchased a commercially available wireless USB adapter that could easily be configured to also work as an access point (see [7]). Also, we gave our RAP an SSID of UBC in order to make it seem as genuine as possible to a casual user who might happen to glance at our RAP s SSID. We then created our own (fake) version of UBC s wireless login page. Using a freely available tool known as AirSnarf, we created the web-page such that, if a user attempts to log in at that page by typing his/her username and password, we would be able to capture those details in a file and direct the user to another web-page that would display the text HACKERS... Just so you know, your password has been obtained. Also, using another freely available tool known as TreeWalk, we poisoned the 3
4 cache of the rogue desktop computer so that all attempts to navigate to the URL on the rogue desktop computer as well as on any wireless laptops connected to our RAP would load up our fake web-page (see [8] for a step-by-step explanation of this entire process). However, attempts to navigate to other URLs would work normally as intended, making it difficult for the victim to suspect any malicious activity. Finally, we brought in a wirelessenabled laptop in the vicinity of our RAP; immediately, the laptop automatically connected to our RAP and thus obtained wireless internet access through our RAP. Then, sure enough, when we navigated to on the laptop, it brought up our fake webpage. When the user typed in his user name and password, the HACKERS... web-page was displayed, and the username and password were available on the rogue desktop computer for viewing. Thus we were able to demonstrate our version of phishing using a rogue desktop computer, a commercially-available wireless USB adapter, and freely available software tools. (3) Snooping: The last threat that we were able to demonstrate was snooping. By running a freely available Ethernet sniffer application on the rogue desktop computer, we were able to observe all the internet traffic of the laptop that was connected to the wireless network through our RAP. One can very well imagine what a serious hacker might be able to do with this type of information: he could profile the victim s internet usage and activity, decrypt sensitive information and cause serious damage to the user. SECURITY ANALYSIS From our work in the previous section, we see that the victim is vulnerable in different ways. The first threat that we demonstrated MAC address spoofing is not only disruptive (by stealing someone s MAC address, we are denying them access to the internet and thereby causing a Denial of Service) but also deceptive (we are masquerading as an authenticated UBC user). Phishing, though, is more dangerous: the confidentiality of the victim s sensitive information is compromised, and by using the harvested username and password, the integrity of information that has been protected using this login data can also be compromised. Therefore, this threat is usurpative in nature. Thus, we see that our work outlines the following threat model: 1. The threat agents here are hackers who would want to conduct malicious activity by using any one of the numerous RAPs available on campus/installing their own RAP (as we did, for example). 2. The threats that they could give rise to are deceptive, disruptive and usurpative in nature. 3. The assets at stake are: valid UBC network credentials (high-value), sensitive user login information (very high-value), and user internet profile and internet activity data (high-to-very-high value). 4
5 EXISITING COUNTERMEASURES We talked to Mr. Geoff Armstrong, a Network Support Analyst in UBC s IT department 1, about existing countermeasures against RAPs. Here is a summary of what he had to say and our corresponding thoughts: UBC is aware of the presence of RAPs on campus (based on the data we collected, we could identify about 400 RAPs; however, according to Mr. Armstrong, there are about 800 of these currently). UBC has a wireless control board that constantly monitors all activity on the UBC wireless network using full-time probes and detects the emergence of RAPs. Indeed, when a RAP appears, analysts such as Mr. Armstrong receive notification alerts via the wireless control board. They can then monitor these APs and, in case any RAP engages in malicious activity, analysts can use valid APs surrounding the rogue to contain it (using a standard industry technique such as four-point or eight-point containment where the legitimate APs surrounding the RAP broadcast higher-power signals than the rogue, ensuring that users only connect to these legitimate APs). However, we were able to conduct malicious activity using our RAP; thus, even though there are system-level techniques available for containment, vulnerabilities and vulnerable timeframes when attackers can operate still exist in UBC s Wi-Fi network. Also, UBC s IT mostly uses due diligence to eliminate RAPs; in most cases, according to Mr. Armstrong, they go knocking on the doors of people 1 He can be reached at geoff.armstrong@ubc.ca running RAPs and ask them to dismantle them. However, this is considerably lowtech, and, based on our work, we argue that this approach cannot provide a quick-enough solution against an attacker who runs, say, a phishing operation from within UBC, especially since he/she can move quickly within UBC and hide his/her RAP behind the considerable number of RAPs already on campus. Thus, our opinion is that though there are counter-measures in place currently, they need strengthening, especially in the light of the number of RAPs currently on campus and the surprisingly malicious activity that can be conducted in a very short timeframe using a RAP. PROPOSED COUNTERMEASURES The countermeasures that we propose advocate the principle of Defense in Depth by ensuring that there are multiple layers in the defense paradigm employed. These measures recommend that students, campus employees and UBC IT administrators employ some basic safeguards in order to reduce the threats due to RAPs. These are grouped into two categories: victim-centric countermeasures and system-centric countermeasures. 1. Victim-centric countermeasures The following are some easy safeguards that can be employed by students and campus employees that can prevent them from becoming victims: Ensure that all pages which require logging in operate under the https protocol. Change browser settings so as to demand certificates from the login website and only login when certificates are valid and unexpired and reflect web-site and issuing 5
6 authority names correctly. (This may be thought of as a variation of The Principle of Complete Mediation, in that every access to an asset (login data) is mediated by the user himself/herself.) Use VPN whenever possible to log onto campus wireless networks. 2. System-centric countermeasures The following are some simple, additional measures that could be employed by UBC s IT department: Regularize the removal of RAPs; establish strict time-intervals within which every RAP must be dismantled. Quarantine systems that create and operate RAPs and maintain revocation lists of offending MAC addresses and SSIDs. Publish this list on prominent websites in the UBC network so that users are better educated about the risks involved with RAPs. CONCLUSION Rogue Access Points pose big security threats to enterprise-strength networks but they can be neutralized with due diligence and decisive action. It is our hope that, by demonstrating some of the threats involved, detailing a threat model, and proposing easily-implemented countermeasures, we have been able to increase reader awareness of this important security problem and educate the reader about how best to avoid some of the risks involved and safeguard the confidentiality and integrity of their sensitive information. REFERENCES [1] Identifying Rogue Access Points. URL: hp/ [2] Rogue Access Point Detection: Automatically Detect and Manage Wireless Threats to your Network. URL: AccessPointDetection.pdf [3] W. Wei, K. Suh, Y. Gu, B. Wang, J. Kurose, "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs", accepted to appear in ACM Internet Measurement Conference (IMC) [4] R. Beyah, S. Kangude, G. Yu, B. Strickland, J. Copeland, Rogue Access Point Detection using Temporal Traffic Characterstics, GLOBECOM [5] J. Hall, M. Barbeau and E. Kranakis, Enhancing Intrusion Detection in Wireless Networks using Radio Frequency Fingerprinting, Communications, Internet and Internet Technology, [6] Your computer connects to an access point that broadcasts its SSID instead of an access point that does not broadcast its SSID.URL: [7] ZyXEL ZyAIR G USB G Wireless Adapter & Soft-AP - G220. URL: usb g-wireless-adapter-softap/q/loc/101/ html [8] Evil Twin Access Points for Dummies. URL: 6
Wireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationDetecting & Eliminating Rogue Access Point in IEEE WLAN
Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationMobile Security Fall 2013
Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationHow Insecure is Wireless LAN?
Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More information5. Execute the attack and obtain unauthorized access to the system.
Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and
More informationNETWORK SECURITY. Ch. 3: Network Attacks
NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network
More informationEVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India
EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India Abstract Now a days wireless access points are widely
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationEECE 412, GROUP 10 REPORT. Security Analysis on the Malicious Use of Public Wi-Fi (December 2010)
1 Security Analysis on the Malicious Use of Public Wi-Fi (December 2010) Moses Chan, Rob O Dwyer, Marie Elise Desormeaux Leowski, and Steve Powell [mochan@live.ca, odwyerrob@gmail.com, eleowski@gmail.com,
More informationMultipot: A More Potent Variant of Evil Twin
Multipot: A More Potent Variant of Evil Twin K. N. Gopinath Senior Wireless Security Researcher and Senior Engineering Manager AirTight Networks http://www.airtightnetworks.net Email: gopinath.kn@airtightnetworks.net
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationAttacking Networks. Joshua Wright LightReading LIVE! October 1, 2003
Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationMotorola AirDefense Retail Solutions Wireless Security Solutions For Retail
Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Wireless Risks in Retail The PCI Security Standards Council is an open global forum, founded by American Express, Discover Financial
More informationRogue Access Point Detection using Temporal Traffic Characteristics
Rogue Access Point Detection using Temporal Traffic Characteristics Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland Communications Systems Center School of Electrical and
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationCHAPTER 8 SECURING INFORMATION SYSTEMS
CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is
More informationProtecting the Platforms. When it comes to the cost of keeping computers in good working order, Chapter10
Chapter10 Protecting the Platforms Painting: The art of protecting flat surfaces from the weather and exposing them to the critic. Ambrose Bierce (1842 1914) When it comes to the cost of keeping computers
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationCISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks
CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationDefine information security Define security as process, not point product.
CSA 223 Network and Web Security Chapter One What is information security. Look at: Define information security Define security as process, not point product. Define information security Information is
More informationComplying with RBI Guidelines for Wi-Fi Vulnerabilities
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informationWeb Cash Fraud Prevention Best Practices
Web Cash Fraud Prevention Best Practices Tips on what you can do to prevent Online fraud. This document provides best practices to avoid or reduce exposure to fraud. You can use it to educate your Web
More informationManagement of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model
Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model Abhijit Vitthal Sathe Modern Institute of Business Management, Shivajinagar, Pune 411 005 abhijit_sathe@hotmail.com
More informationFrequently Asked Questions WPA2 Vulnerability (KRACK)
Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key
More informationTOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS
TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS 1 Introduction Your data and infrastructure are at the heart of your business. Your employees, business partners, and
More informationWi-Net Window and Rogue Access Points
Wi-Net Window and Rogue Access Points The Wi-Net Window (WP150) has several features that make it ideal for detecting and locating rogue access points: A rogue access point is a wireless access point that
More informationWebomania Solutions Pvt. Ltd. 2017
The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.
More information2. INTRUDER DETECTION SYSTEMS
1. INTRODUCTION It is apparent that information technology is the backbone of many organizations, small or big. Since they depend on information technology to drive their business forward, issues regarding
More informationImplementing. Security Technologies. NAP and NAC. The Complete Guide to Network Access Control. Daniel V. Hoffman. WILEY Wiley Publishing, Inc.
Implementing NAP and NAC Security Technologies The Complete Guide to Network Access Control Daniel V. Hoffman m WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XIII XV Chapter 1 Chapter
More informationRogue Access Point Detection using Challenge-Response Mechanism
Rogue Access Point Detection using Challenge-Response Mechanism Audumbar Chormale, Kishorkumar Datar Dept of CSEE, University of Maryland, Baltimore County, Baltimore, MD 21250, USA Email: auduc1@umbc.edu,
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationCoordinated Threat Control
Application Note Coordinated Threat Control Juniper Networks Intrusion Detection and Protection (IDP) and Secure Access SSL VPN Interoperability Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More informationIntroduction to Information Security Dr. Rick Jerz
Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions
More informationKarthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03
Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless
More informationChapter 4. Network Security. Part I
Chapter 4 Network Security Part I CCNA4-1 Chapter 4-1 Introducing Network Security Introduction to Network Security CCNA4-2 Chapter 4-1 Introducing Network Security Why is Network Security important? Rapid
More informationSolution Architecture
2 CHAPTER Introduction The purpose of the Secure Wireless is to provide common security services across the network for wireless and wired users and enable collaboration between wireless and network security
More informationInformation Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards
COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN
More informationWIDS Technology White Paper
Technical white paper WIDS Technology White Paper Table of contents Overview... 2 Background... 2 Functions... 2 Rogue detection implementation... 2 Concepts... 2 Operating mechanism... 2 Operating modes...
More informationConfiguring Security Solutions
3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationDetecting Protected Layer-3 Rogue APs
Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationSecuring Wireless Networks by By Joe Klemencic Mon. Apr
http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies
More informationSPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Determine relevance of
More information2013 InterWorks, Page 1
2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations
More informationII. CURRENT APPROACHES. A. Wireless Approaches
Rogue Access Point Detection using Temporal Traffic Characteristics Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland Communications Systems Center School of Electrical and
More informationWHITEPAPER. Protecting Against Account Takeover Based Attacks
WHITEPAPER Protecting Against Account Takeover Based Email Attacks Executive Summary The onslaught of targeted email attacks such as business email compromise, spear phishing, and ransomware continues
More informationObstacle Avoiding Wireless Surveillance Bot
Volume 118 No. 20 2018, 4309-4314 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Obstacle Avoiding Wireless Surveillance Bot ijpam.eu Aman Aryan, Aakanksha Mishra, Raashi Pradeep Shetty Department
More informationDrone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created
Drone - 2 04/12/2018 Threat Model Description Threats Threat Source Risk Status Date Created Mobile Phone: Sensitive Data Leakage Smart Devices Mobile Phone: Session Hijacking Smart Devices Mobile Phone:
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationGuide to Network Security First Edition. Chapter One Introduction to Information Security
Guide to Network Security First Edition Chapter One Introduction to Information Security About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationData Communication. Chapter # 5: Networking Threats. By: William Stalling
Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More informationNetwork Security and Cryptography. December Sample Exam Marking Scheme
Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers
More informationSchool of Computer Sciences Universiti Sains Malaysia Pulau Pinang
School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content
More informationCYBER ATTACKS EXPLAINED: PACKET SPOOFING
CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service
More informationPayment Card Industry Data Security Standard (PCI DSS) Primer Version 1.1
T E C H N O L O G Y W H I T E P A P E R Payment Card Industry Data Security Standard (PCI DSS) Primer Version 1.1 Applying PCI to wireless LANS and compliance requirements Credit card theft is costing
More informationWireless Network Standard
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
More informationEndpoint Security - what-if analysis 1
Endpoint Security - what-if analysis 1 07/23/2017 Threat Model Threats Threat Source Risk Status Date Created File Manipulation File System Medium Accessing, Modifying or Executing Executable Files File
More informationCisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion
Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion What You Will Learn The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium,
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationA Visualization Tool for Wireless Network Attacks
A Visualization Tool for Wireless Network Attacks Xiaohong YUAN, Ricky L. ARCHER, Jinsheng XU, Huiming YU Department of Computer Science, North Carolina A&T State University Greensboro, NC 27411, USA ABSTRACT
More informationSecuring Information Systems
Chapter 7 Securing Information Systems 7.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES Why are information systems vulnerable to destruction, error, and abuse? What is the business
More informationManaging Rogue Devices
Finding Feature Information, page 1 Information About Rogue Devices, page 1 How to Configure Rogue Detection, page 6 Monitoring Rogue Detection, page 8 Examples: Rogue Detection Configuration, page 9 Additional
More informationAuthentication Methods
CERT-EU Security Whitepaper 16-003 Authentication Methods D.Antoniou, K.Socha ver. 1.0 20/12/2016 TLP: WHITE 1 Authentication Lately, protecting data has become increasingly difficult task. Cyber-attacks
More informationSecuring Information Systems
Introduction to Information Management IIM, NCKU System Vulnerability and Abuse (1/6) Securing Information Systems Based on Chapter 8 of Laudon and Laudon (2010). Management Information Systems: Managing
More informationSYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS
SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;
More informationAURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo
ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking
More informationIntrusion Attempt Who's Knocking Your Door
10 Intrusion Attempt Who's Knocking Your Door By Kilausuria binti Abdullah Introduction: An intrusion attempt is a potential for a deliberate unauthorized attempt to enter either a computer, system or
More informationChair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationEthical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,
More informationProtect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com
Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering
More informationFRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES
More informationInternet Platform Management. We have covered a wide array of Intel Active Management Technology. Chapter12
Chapter12 Internet Platform Management The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it
More information